For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining
Namhi KANG Christoph RULAND
IEICE TRANSACTIONS on Communications
Publication Date: 2005/03/01
Print ISSN: 0916-8516
Type of Manuscript: LETTER
stream authentication schemes, hash chaining, denial of service(DoS) attack,
Full Text: PDF(72.2KB)>>
In this letter, we show that some stream authentication schemes using hash chaining are highly vulnerable to denial of service (DoS) attacks. An adversary can disrupt all receivers of group by making use of modifying a few packets in those schemes.